El Paso Ambulatory Clinic Policy and Procedure
|
|
- Dwain Maurice Holland
- 8 years ago
- Views:
Transcription
1 Title: Regulation Reference: CONTACT CENTER CALL MONITORING AND RECORDING Policy Number: EP 1.22 Effective Date: 1/2015 Policy Statement: It is the policy of the Texas Tech University Health Sciences Center at El Paso (TTUHSC El Paso) to record and monitor any call routed through and from a TTUHSC El Paso Contact Center. Scope and Distribution: The purpose of this policy is to establish procedures to manage call monitoring and recording in accordance with TTUHSC El Paso personnel and security requirements. Call monitoring, recording, storing and archiving of incoming calls to a TTUHSC El Paso Contact Center will be used to improve the service provided to callers and to support staff carrying out their responsibilities. Monitoring, recording, storing, and archiving incoming calls and screen shots will provide an accurate record for the following: a. Identifying Contact Center staff training/developmental needs. b. Protecting Contact Center staff from abusive or nuisance calls. c. Improving Contact Center staff performance and quality of service to our patients. d. Establishing facts in the event of a complaint either by a caller or a staff member and assist in resolution. e. Assisting in Contact Center quality control to identify issues in Contact Center procedures with the goal of improvement. f. Confirm calls are accurately and efficiently transcribed when needed. This policy applies to any call routed through and from a TTUHSC El Paso Contact Center in the ambulatory clinics. Definitions: 1. Contact Center: A contact center is an automated call distribution system used at TTUHSC El Paso to handle and manage patient phone calls. 2. Call: A call is defined as the voice call itself, as well as related workstation screen shots of the contact center agent handling the call. 3. Contact Center Manager: A contact center manager is the individual or designee who is responsible for the overall operations of a contact center and the software applications. 4. Contact Center Agent Supervisor: A contact center Supervisor is a Department employee assigned to oversee the performance of the contact center agents within that Department. 5. Contact Center Agent: A contact center agent is considered any employee who handles patient calls routed through the TTUHSC El Paso Contact Center. Page 1 of 5
2 6. Call monitoring: The listening to a live or recorded interaction between an incoming caller and an agent generally used in training and, on an ongoing basis, to ensure that customer service and productivity goals are being met. Procedure: 1. All TTUHSC El Paso contact center callers will be advised as part of the welcome message that calls may be monitored and/or recorded for service improvement purposes. 2. TTUHSC El Paso contact center shall be utilized strictly for the handling of business related calls. The system shall not be utilized for ANY personal/private matter of any kind. 3. Each Department shall notify the Contact Center Manager via TTUHSC , of each individual designated in their Department as a Contact Center Agent, and the Contact Center Agent Supervisor, as well as any additions or deletions. The Contact Center Manager will maintain a summary list of such individuals. 4. Contact Center Agent Supervisors will notify Contact Center agents, either at time of hire or upon assuming Contact Center responsibilities that any call routed through the TTUHSC El Paso Contact Center may be monitored and/or recorded. This information will also be included in the Position Description of all Contact Center agents. 5. Contact Center Agent Supervisors shall document that each employee is informed of the work place areas that are subject to monitoring and/or recording and that TTUHSC El Paso Contact Center phones should not be relied on as confidential if used for discussion of private matters. This will be accomplished by the Contact Center Agent signing the Notice of Monitoring (attachment A ). The original signed form will be forwarded along with the request for access to the AVAYA system. A copy of the form will be maintained by the Contact Center Agent Supervisor and Contact Center Manager. 6. Contact Center Managers shall notify agents of the standards on which their calls will be evaluated in writing prior to utilizing monitored calls for a formal evaluation or disciplinary process. 7. Contact Center Manager will identify and designate areas where recording takes place and verify appropriate personnel who have authority to access recorded data. 8. Contact Center Manager must seek further guidance from the Vice President for Human Resources if a recording has been identified as part of a disciplinary investigation. 9. Contact Center calls may be monitored live, or stored and reviewed via two mechanisms: Quality Management (QM) and Archive Recording. The Texas Tech University System Communication Services department shall store call recordings securely, with access to the recordings controlled and managed by Communication Services in conjunction with the TTUHSC El Paso Information Technology (IT) Security team. 10. Access to the recordings will be controlled by eraider login and will be restricted to TTUHSC El Paso Contact Center Managers and Supervisors designated by the senior person at the appropriate school, institute, operating unit, or department/division. All access to recorded calls is logged. Page 2 of 5
3 11. Communication Services will provide training on how to live monitor and access recorded calls and screen recording to Contact Center managers who require it. 12. The Quality Management functionality stores calls and related screen shots for a pre-defined period of time (currently 30 days) after the call. Contact Center Agent Supervisors or the Contact Center Manager may access these recordings at any time as deemed necessary to support the business operations of the clinic. 13. Certain calls may be identified as needing to be retained for a period greater than 30 days or indefinitely. Examples of such calls may include significant patient complaints, threats against individuals or the institution, or for use in the employee disciplinary processes. Such calls will be retained in the archive recording process. The process to archive a call is as follows: a. A call requiring archiving is identified by an authorized user of the AVAYA system. b. A request to archive the call is generated by the Contact Center Agent Supervisor to the Contact Center Manager via TTUHSC . The request should contain at a minimum i. Identifying information about the call including Call ID, caller number, date, and time ii. A brief description of the reason for the request to archive. c. The Contact Center Manager will forward the request to TTU System Communications. d. TTU System Communications will locate the recording and move it to a secure server for storage. e. Requests to access an archived recording may be initiated by the Contact Center Manager or Contact Center Agent Supervisor to the Contact Center Manager. These individuals are encouraged to communicate with Human Resources or the Office of General Counsel on campus prior to requesting the release of the recording. f. Release of the recording, or a transcript, will be made available to Human Resources or the Office of General Counsel on campus. In no circumstances, will the release be made directly to the Contact Center Manager or Contact Center Agent Supervisor. Release of the recording and / or transcript will be made to the Contact Center Manager or Contact Center Agent Supervisor by Human Resources or the Office of General Counsel. Violation of This Policy: Violation of any part of this operating policy may result in disciplinary action in accordance with other applicable TTUHSC policies. Right to Change Policy: TTUHSC El Paso reserves the right to interpret, change, modify, amend, or rescind this policy in whole or in part at any time without the consent of employees. Page 3 of 5
4 Policy Number: EP 1.22 Original Approval Date: 1/2015 Version Number: 1 Revision Date: Signatory approval on file by: Michael J. Romano, M.D. Associate Dean of Clinical Affairs Clinic Operations Committee, Chair Texas Tech University Health Sciences Center El Paso Page 4 of 5
5 Attachment A Notice of Monitoring During Use of Contact Center Phones. I have received a copy of the TTUHSC EP Ambulatory Policy # 1.22, Contact Center Call Monitoring and Recording. I am aware of the following 1. The use of the contact center should be restricted to business related calls. 2. All calls into and out of the contact center may be monitored live, are recorded and retained for a minimum of 30 days. 3. In the event I believe a call should be retained longer than 30 days, I should contact my supervisor. 4. I am aware that call recordings may be used for training, evaluation, and disciplinary processes. Department: Contact Center Agent Contact Center Agent Supervisor Date Date This form should be submitted, along with the request for AVAYA access, to the Contact Center Manager. A copy should be retained by the Department and the Contact Center Manager. Page 5 of 5
El Paso - Ambulatory Clinic Policy and Procedure
Regulation Reference: El Paso - Ambulatory Clinic Policy and Procedure Title: Disposal of Expired Medications Policy Number: EP 3.5 Policy Statement: Effective Date: 8/1/2014 It is the policy of Texas
More informationNetwork and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
More informationCollege of Education Computer Network Security Policy
Introduction The College of Education Network Security Policy provides the operational detail required for the successful implementation of a safe and efficient computer network environment for the College
More informationTEXAS TECH UNIVERSITY HEALTH SCIENCES CENTER EL PASO
TEXAS TECH UNIVERSITY HEALTH SCIENCES CENTER EL PASO Operating Policy and Procedure HSCEP OP: PURPOSE: REVIEW: 50.37, Payment Card Processing by TTUHSC El Paso Departments The purpose of this Texas Tech
More informationPierce County Policy on Computer Use and Information Systems
Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail
More informationOnline Employment System User Manual
Troy University Online Employment System User Manual People Admin Version 7 Human Resources April 2014 Table of Contents Introduction... 2 User Types and Access... 2 Creating a User Account... 3 Homepage...
More informationTexas Tech University Health Sciences Center Billing Compliance Program Policy and Procedure
5.1 Responding to External Billing Audit Requests Approved Date: December 2, 2010 Effective Date: December 2, 2010 Latest Revision: A. PURPOSE The purpose of this policy is to establish a process to promptly
More informationHealthcare Compliance and Hybrid Entity Designation
[New OP initial posting 8/28/14] Operating Policy and Procedure : Healthcare Compliance and Hybrid Entity Designation DATE: August 28, 2014 PURPOSE: The purpose of this Texas Tech Operating Policy and
More informationHow To Add Security Roles On Banner Har Account On A Pc Orca (For A Free Download) On A Microsoft Powerbook (For Free) On An Ipa 2.5 (For An Ipad) On Pc Ora (For
Banner HR Account Request System Login and Usage: Login: 1. Go to http://accounts.unh.edu 2. Click on the IT Accounts Management System button 3. Login Adding Security Roles After logging in the Home screen
More informationTtuhsc el paso Gayle Greve Hunt school of nursing FACULTY GOVERNANCE
Ttuhsc el paso Gayle Greve Hunt school of nursing FACULTY GOVERNANCE GGHSON FACULTY assembly The purpose of the Faculty Assembly shall be to: Facilitate involvement of the faculty in communication and
More informationTTUHSC Staff Performance Management Employee Self Assessment User s Guide 12/2011
TTUHSC Staff Performance Management Employee Self Assessment User s Guide 12/2011 1 Table of Contents Program Overview... 3 Self Assessment...4 STEP 1 - Click the Self Assessment form link..4 STEP 2 -
More informationInformation Security Operational Procedures Banner Student Information System Security Policy
Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides
More informationInformation Security Operational Procedures
College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by
More informationIndiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002
Indiana University of Pennsylvania Information Assurance Guidelines Approved by the Technology Utilities Council 27-SEP-2002 1 Purpose... 2 1.1 Introduction... 2 1.1.1 General Information...2 1.1.2 Objectives...
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationInformation Systems Security Policy
Information Systems Security Policy University of South Alabama Computer Services Center University of South Alabama 5840 USA Drive South 251-460- 6161 5/19/2014 Outline 1 Introduction... 2 Data Retrieval
More informationNYCC Call recording policy
NYCC Call recording policy Author Tristram Gardner Version V5 Updated By Sarah Foley Issue Date Oct 2009 Last Update May 2013 Summary This document outlines the North Yorkshire County Council (NYCC) policy
More informationR345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
More informationDrug and Alcohol Testing for Safety- and Security-sensitive Positions
[Minor revision posted 3/7/14 (replaces 1/27/12 edition)] Operating Policy and Procedure : Drug and Alcohol Testing for Safety- and Security-sensitive Positions DATE: March 7, 2014 PURPOSE: The purpose
More informationPolicies of the University of North Texas
Policies of the University of North Texas 8.5 Use of University Non-Wireless and Wireless Telephones, Telephone Lines, Fax Machines and Personal Computing Devices Chapter 14 Chapter Name Information Technology
More informationEMERGENCY RESPONSE PLAN SUMMARY PRESENTATION
EMERGENCY RESPONSE PLAN SUMMARY PRESENTATION Risk Assessment Committee Statement of Purpose The Emergency Response Plan is a comprehensive framework for the management of critical incidents, issues, or
More informationTEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Policy Number: 04.75.12 Issuing Authority: Office of the Vice President for Computer and Financial Services, and Chief Information Officer Responsible
More informationb. Advancement: A promotion to the next higher level of qualification. Minimum Pay Plan for Utilities Operator Minimum Pay Grade
PHYSICAL PLANT OPERATING POLICY AND PROCEDURE : Personnel Qualification System DATE: August 23, 2013 PURPOSE The purpose of this Physical Plant Operating Policy and Procedure (PP/OP) is to set forth procedures
More informationUNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy
UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy RESPONSIBLE OFFICIAL : Executive Vice Chancellor/Provost RESPONSIBLE OFFICIAL : Business & Financial Services EFFECTIVE
More informationREGULATIONS FOR THE USE OF CORPORATE ELECTRONIC MAIL SYSTEM BY STAFF OF THE STATE UNIVERSITY HIGHER SCHOOL OF ECONOMICS. 1. General Provisions
T r a n s l a t e d i n H S E E x p e r t T r a n s l a t i o n C e n t r e 1 APPROVED by Directive No. 31.1-04/771 of the State University Higher School of Economics dated October 22, 2010 REGULATIONS
More informationTexas Tech University Health Sciences Center-El Paso. Medical Equipment Management Plan
Texas Tech University Health Sciences Center-El Paso Medical Equipment Management Plan Medical Equipment Management Plan Contents I. Objective and Purpose II. III. IV. Selection and Acquisition Equipment
More informationOperating Policy and Procedure. DATE: February 9, 2015
[Major revision posted 2/9/15 (replaces 9/19/12 edition)] Operating Policy and Procedure : Overtime DATE: February 9, 2015 PURPOSE: The purpose of this Operating Policy and Procedure (OP) is to establish
More informationWHISTLEBLOWER LAW. Subtitle 3. Maryland Whistleblower Law in the Executive Branch of State Government.
WHISTLEBLOWER LAW Subtitle 3. Maryland Whistleblower Law in the Executive Branch of State Government. 5-301. Applicability. This subtitle applies to all employees and State employees who are applicants
More informationFY16 Minimum Pay Plan for Utilities Operator Minimum Starting Pay. Pay Title
OPERATIONS DIVISION : Personnel Qualification System DATE: September 10, 2015 PURPOSE The purpose of this Operations Division Standard Operating Procedure (OD/SOP) is to set forth procedures for administration
More informationIT Security Standard: Patch Management
IT Security Standard: Patch Management Introduction This standard defines specific procedural and configuration elements needed to implement the Bellevue College policy # 5250: Information Technology (IT)
More informationDEPARTMENT OF AGRICULTURAL EDUCATION & COMMUNICATIONS. Distance Student Information
DEPARTMENT OF AGRICULTURAL EDUCATION & COMMUNICATIONS Distance Student Information DISTANCE STUDENT INFORMATION Version 2006 Texas Tech University Lubbock, Texas Written by René Miller, July, 2006 Table
More informationUpdated 2014 HOW. the ETHICS PROCESS WORKS
Updated 2014 HOW the ETHICS PROCESS WORKS INTRODUCTION Lockheed Martin employees have a shared commitment to the highest standards of ethical conduct and a vital responsibility for upholding the values
More informationBAPTIST HEALTH CORPORATE COMPLIANCE PLAN
BAPTIST HEALTH CORPORATE COMPLIANCE PLAN BAPTIST HEALTH and its subsidiaries have a long-standing reputation for conducting both business and patient care activities with the highest level of ethical behavior
More informationUNIVERSITY COMPLIANCE PLAN
UNIVERSITY COMPLIANCE PLAN Objectives of the Compliance Program The University Compliance Program provides a proactive program that ensures full compliance with all applicable policies, procedures, laws
More informationPolicy on Background Checks and Credential Verifications
HUMAN RESOURCES Effective Date: October 2013 Date Revised: N/A Supersedes: Background Check Policy, Credential Verification Policy Related Policies: Responsible Office/Department: Human Resources Management
More informationTHE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS
THE CITY UNIVERSITY OF NEW YORK FERPA RELEASE FORM PERMISSION FOR ACCESS TO EDUCATIONAL RECORDS This form allows students to grant third parties, including parents, access to their educational records
More informationSupervisor Website Training Manual
Supervisor Website Training Manual Welcome to Eastern Connecticut State University s Student Employment Website! Making the connection between student applicants and supervisors easier than ever. The On-Campus
More informationOffice of the President University Policy
Office of the President University Policy SUBJECT: UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY Effective Date: 7-3-12 Policy Number: 4.1.2 Supersedes: Page Of Presidential 1 6 Memorandum #85 Responsible
More informationApplicant Online Guide
Applicant Online Guide Purpose This is a guide to assist applicants submit their application to Brunswick County for a posted position. System Compatibility 1.) This Application tool works best with Internet
More informationSt. John Fisher College Banner/ApplicationXtender Access Request Form
St. John Fisher College Banner/ApplicationXtender Access Request Form The Banner/ApplicationXtender Access Request Form consists of five pages, this instruction page and four pages for access request of
More informationDEPARTMENT OF MENTAL HEALTH AND DEVELOPMENTAL DISABILITIES
DEPARTMENT OF MENTAL HEALTH AND DEVELOPMENTAL DISABILITIES POLICIES AND PROCEDURES Subject: ADMINISTRATION OF HIPAA Effective Date: 12/15/03 Review Date: 6/8/06 Revision Date: 11/21/06 (All legal citations
More informationLouisiana State University School of Medicine at Shreveport
Louisiana State University School of Medicine at Shreveport Policy Date Updated Page Compliance Policy Summary -- 2 Vendor Solicitation Policy 4/1/2011 8 Drug Samples 7/1/2010 11 Continuing Medical Education
More informationHosted Voice Product Training Automatic Call Distributor (ACD)
Hosted Voice Product Training Automatic Call Distributor (ACD) 1 Agenda 1. Customer Resource Center 2. Logging In 3. Main Screen 4. Search Calls 5. Download Reports 6. Queues 8. Monitor 9. Whisper 10.
More informationPolicy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
More informationSTUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
More informationIDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying
More informationDePaul University Records Management Manual November 1, 2014
Records Management Manual November 1, 2014 A Note from the Director November 1, 2014 Dear Community Member, On behalf of the Department of Records Management, I welcome you to our vibrant community. As
More informationBOARD OF DIRECTORS COMMUNICATION POLICY. Adopted February 25, 2015
1. Policy Statement BOARD OF DIRECTORS COMMUNICATION POLICY Adopted February 25, 2015 Tribune Media Company (the Company ) values the input and insights of its stockholders and other interested parties
More informationHiring Procedures and Guidelines
Hiring Procedures and Guidelines 33.99.01.R0.01 Employment Practices Updated 10/06/2014 A Guide for Hiring This document is provided to be a guide for the hiring process. The document, tools referenced,
More informationTABLE OF CONTENTS. University of Northern Colorado
TABLE OF CONTENTS University of Northern Colorado HIPAA Policies and Procedures Page # Development and Maintenance of HIPAA Policies and Procedures... 1 Procedures for Updating HIPAA Policies and Procedures...
More informationCUNY New York Workplace Violence Policy and Procedures
CUNY New York Workplace Violence Policy and Procedures The City University of New York has a longstanding commitment to promoting a safe and secure academic and work environment that promotes the achievement
More informationProgram Statement. U.S. Department of Justice Federal Bureau of Prisons
U.S. Department of Justice Federal Bureau of Prisons Program Statement OPI: CPD/CPB NUMBER: P5264.08 DATE: SUBJECT: Inmate Telephone Regulations CORRECTED COPY 2/11/2008" Boxed Bold - Federal Regulation
More informationDEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
More informationMontgomery County Government Department of Information Systems and Telecommunications Internet, Intranet, & Electronic Mail Policy
Montgomery County Government Department of Information Systems and Telecommunications Internet, Intranet, & Electronic Mail Policy I. PURPOSE This material sets forth Montgomery County s policy (hereafter
More informationUCLA Policy 313: Prevention of Identity Theft
UCLA Policy 313: Prevention of Identity Theft Issuing Officer: Executive Vice Chancellor and Provost Responsible Dept: Corporate Financial Services Effective Date: July 29, 2009 Supersedes: New I. REFERENCES
More informationUse of ESF Computing and Network Resources
Use of ESF Computing and Network Resources Introduction: The electronic resources of the State University of New York College of Environmental Science and Forestry (ESF) are powerful tools, shared among
More informationHow To Protect Data At Northeast Alabama Community College
Information Systems Security Policy Northeast Alabama Community College Center for Information Assurance Northeast Alabama Community College 138 AL Hwy 35, Rainsville, AL 35986 (256) 228-6001 1 5/22/2014
More informationDispute Resolution Procedures for Administrative/Professional and Clerical/Service Staff Members
Dispute Resolution Procedures for Administrative/Professional and Clerical/Service Staff Members These operating procedures supplement the policy on Dispute Resolution for Administrative/Professional and
More informationNOTICE OF PRIVACY PRACTICES (HIPAA Compliance)
Responsible University Administrator: Vice President for Student Affairs Responsible Officer: Director of Student Counseling Services Origination Date: Current Revision Date: 02/21/13 Next Review Date:
More informationA Border Healthcare Dialogue
Texas Tech University Health Sciences Center and the Dartmouth Institute: A Border Healthcare Dialogue Saturday, November 3, 2012 El Paso Museum of Art 1 Arts Festival Plaza El Paso, Texas, 79901 CONFERENCE
More informationARTICLE I POWERS AND DUTIES Section I. The Student Government shall be empowered to carry out all provisions and necessary implications of its
ARTICLE I POWERS AND DUTIES Section I. The Student Government shall be empowered to carry out all provisions and necessary implications of its Constitution, making such regulations as it considers necessary
More informationState University of New York at Potsdam. Workplace Violence Prevention Policy and Procedures
State University of New York at Potsdam Workplace Violence Prevention Policy and Procedures Revision Date: September 15, 2015 Page 1 of 7 TABLE OF CONTENTS Policy... 3 Statement... 3 Definitions... 3 Application
More informationFERPA Q &A for Banner Users. November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel
FERPA Q &A for Banner Users November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel FERPA tutorial http://www.dartmouth.edu/~reg/guides/ferpa/ FERPA = Family Educational
More informationYour Texas Benefits Card
Your Texas Benefits Card Provider Interactive Voice Response User Guide How to Access and Use the Provider IVR System to Access Medicaid Member Information Updated: October 10, 2013 Table of Contents Table
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 5 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: October 19, 2006 Contact for More Information: Chief Privacy Officer 1303 A West Campus
More informationRecruitment and Appointment of Academic Administrators
NUMBER: ACAF 1.01 SECTION: SUBJECT: Academic Affairs Recruitment and Appointment of Academic Administrators DATE: February 1, 1995 REVISED: November 11, 2014 Policy for: Procedure for: Authorized by: Issued
More informationBYLAWS of the Graduate School of Biomedical Sciences
BYLAWS of the Graduate School of Biomedical Sciences SECTION 1. Programs of the Graduate School of Biomedical Sciences The Graduate School of Biomedical Sciences (GSBS) of the Texas Tech University Health
More informationPROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS
The Johns Hopkins University Krieger School of Arts & Sciences/Whiting School of Engineering PROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS Established March
More informationINSTITUTIONAL COMPLIANCE PLAN
INSTITUTIONAL COMPLIANCE PLAN Responsible Party: Board of Trustees Contact: Institutional Compliance Office Original Effective Date: 02/16/2012 Last Revised Date: 10/13/2014 Contents I. SCOPE OF THE PLAN...
More informationU.S. Department of Justice Office of the Inspector General Audit Division
AUDIT OF THE DRUG ENFORCEMENT ADMINISTRATION S LANGUAGE SERVICES CONTRACT WITH SOS INTERNATIONAL, LTD. CONTRACT NUMBER DJDEA-05-C-0020 DALLAS FIELD DIVISION U.S. Department of Justice Office of the Inspector
More informationSouthern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources
Southern Law Center Law Center Policy #IT0014 Title: Privacy Expectations for SULC Computing Resources Authority: Department Original Adoption: 5/7/2007 Effective Date: 5/7/2007 Last Revision: 9/17/2012
More informationTITLE 4. ADMISSIONS AND EDUCATIONAL STANDARDS
TITLE 4. ADMISSIONS AND EDUCATIONAL STANDARDS DIVISION 2. ACCREDITED LAW SCHOOL RULES Adopted by the Committee of Bar Examiners and Approved by the Board of Governors of The State Bar of California Effective
More informationAdministrative Procedures Manual. Management Information Services
I-23.10 Management Information Services The College owns and operates a local area network (LAN) that connects the College's computing hardware and services. Computing hardware refers to any device that
More informationVisiting Scholar and Visiting Researcher Guidelines
Page 1 of 9 Visiting Scholar and Visiting Researcher Guidelines Section I. General Provisions A. Purpose Statement The University of Texas at Austin recognizes that individuals from other universities,
More informationADMINISTRATORS GROUP MINUTES March 6, 2014 Meeting
ADMINISTRATORS GROUP MINUTES March 6, 2014 Meeting NEXT MEETING: Please Note!! The next Administrators Group meeting is scheduled for Wednesday, April 2, 2014 in the Student Union Building, Matador Room.
More informationUniversity of Louisiana System
Policy Number: M-17 University of Louisiana System Title: RECORDS RETENTION & Effective Date: OCTOBER 10, 2012 Cancellation: None Chapter: Miscellaneous Policy and Procedures Memorandum Each institution
More informationCUSTOMER SERVICE Operational KPIs
CUSTOMER SERVICE Operational KPIs Page 1 of 10 Table of Contents SECTION I: CUSTOMER SERVICE STAFFING, STRUCTURE AND LOCATION(S)... 3 A. ORGANIZATIONAL STRUCTURE... 3 B. STAFFING... 4 C. CALL CENTER MEMBERSHIP
More informationBRIDGEVALLEY COMMUNITY AND TECHNICAL COLLEGE OPERATING POLICY
BRIDGEVALLEY COMMUNITY AND TECHNICAL COLLEGE OPERATING POLICY Effective Date Subject Number Page September 14, 2014 RECORDS RETENTION GUIDELINES E-OP-8-14 1 of 11 Supersedes/Supplements: Reference: BC
More informationPolicy on Dignity and Respect (Students)
Policy on Dignity and Respect (Students) Scope and Purpose of the Policy This policy relates to all students of DMU. Every student is personally liable under the Equality Act and is expected to treat staff
More informationTitle: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
More informationUniversity Specialty Clinics and Palmetto Health Billing Compliance Plan
Introduction The University of South Carolina School of Medicine Educational Trust d/b/a University Specialty Clinics (USC) manages the clinical faculty practice plan of the University of South Carolina
More informationAccount Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
More informationContact Center Help: Report Types Glossary
Contact Center Help: Report Types Glossary Topic: LiveOps Admin Portal > Help > Report Types Glossary Site: https://tenant.hostedcc.com/mason/admin/help/glossary-rtype.html Date: February, 2015 About The
More informationHIPAA Privacy Policy & Notice of Privacy Practices
HIPAA Privacy Policy & Notice of Privacy Practices 1. PURPOSE 1 The purpose of this policy is to comply with patient personal health information security rights and privacy regulations as outlined in the
More informationUNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM. SECTION: Information Services NUMBER: 07.A.07
UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM SECTION: Information Services NUMBER: 07.A.07 AREA: Computing Services SUBJECT: Use of Electronic Messaging Services by Employees 1. PURPOSE The purpose
More informationInformation Security Plan May 24, 2011
Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised
More informationDenver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
More informationAppropriate Use Policy for Information Technology
Appropriate Use Policy for Information Technology Amarillo College Faculty, Staff, Students, Friends and Guests Amarillo College reserves the right to amend or otherwise revise this document as may be
More informationNETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
More informationUMDNJ COMPLIANCE PLAN
UMDNJ COMPLIANCE PLAN INTRODUCTION...2 COMPLIANCE OVERSIGHT 3 COMPLIANCE COMMITTEE STRUCTURE...4 CHIEF COMPLIANCE OFFICER S RESPONSIBILITIES...5 RESEARCH COMPLIANCE.5 UNIT IMPLEMENTATION.6 COMPLIANCE POLICIES
More informationCREDIT CARD PROCESSING POLICY AND PROCEDURES
CREDIT CARD PROCESSING POLICY AND PROCEDURES Note: For purposes of this document, debit cards are treated the same as credit cards. Any reference to credit cards includes credit and debit card transactions.
More informationCATASAUQUA AREA SCHOOL DISTRICT
CATASAUQUA AREA SCHOOL DISTRICT No. 0 SECTION: Non-Professional Personnel TITLE: Policy Re Drug/Alcohol Testing ADOPTED: November, REVISED: November, 0 REVIEWED: November, 0 0. TESTING FOR ALCOHOL AND
More informationProcedure 1B.1.1 Report/Complaint of Discrimination/Harassment Investigation and Resolution
Minnesota State Colleges and Universities System Procedures Chapter 1B System Organization and Administration / Equal Education and Employment Opportunity Report/Complaint of Discrimination/Harassment
More informationThe Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
More informationCollege of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
More informationPolicy on Access to Electronic Information As voted by the President and Fellows of Harvard College on March 31, 2014; amended May 8, 2015
Policy on Access to Electronic Information As voted by the President and Fellows of Harvard College on March 31, 2014; amended May 8, 2015 Scope of Policy This policy sets out guidelines and processes
More informationWhat is a definition of risk?
What is a definition of risk? Definition of Risk Risk is the probability or threat of any negative occurrence caused by internal or external vulnerabilities interfering with achieving objectives that may
More informationDIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING,
Page 1 of 6 DIRECTOR OF HUMAN RESOURCES & EMPLOYER-EMPLOYEE RELATIONS-EEO, DIVERSITY COMPLIANCE & TRAINING, JC #676 - Classified Management - Integrated Academic Administrator and Classified Manager Salary
More information